A practical model based on anomaly detection for protecting medical IoT control services against external attacks L Fang, Y Li, Z Liu, C Yin, M Li, ZJ Cao IEEE Transactions on Industrial Informatics 17 (6), 4260-4269, 2020 | 42 | 2020 |
Privacy protection for medical data sharing in smart healthcare L Fang, C Yin, J Zhu, C Ge, M Tanveer, A Jolfaei, Z Cao ACM Transactions on Multimedia Computing, Communications, and Applications …, 2020 | 41 | 2020 |
A privacy preserve big data analysis system for wearable wireless sensor network C Ge, C Yin, Z Liu, L Fang, J Zhu, H Ling Computers & Security 96, 101887, 2020 | 32 | 2020 |
A hybrid fuzzy convolutional neural network based mechanism for photovoltaic cell defect detection with electroluminescence images C Ge, Z Liu, L Fang, H Ling, A Zhang, C Yin IEEE Transactions on Parallel and Distributed Systems 32 (7), 1653-1664, 2020 | 29 | 2020 |
A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine L Fang, C Yin, L Zhou, Y Li, C Su, J Xia Information Sciences 507, 143-160, 2020 | 29 | 2020 |
Promptattack: Prompt-based attack for language models via gradient search Y Shi, P Li, C Yin, Z Han, L Zhou, Z Liu CCF International Conference on Natural Language Processing and Chinese …, 2022 | 12 | 2022 |
Graph embedding-based money laundering detection for Ethereum J Liu, C Yin, H Wang, X Wu, D Lan, L Zhou, C Ge Electronics 12 (14), 3180, 2023 | 10 | 2023 |
ANCS: Automatic NXDomain classification system based on incremental fuzzy rough sets machine learning L Fang, X Yun, C Yin, W Ding, L Zhou, Z Liu, C Su IEEE Transactions on Fuzzy Systems 29 (4), 742-756, 2020 | 8 | 2020 |
Gas price prediction based on machine learning combined with ethereum mempool D Lan, H Wang, C Yin, L Zhou, C Ge, X Lu 2022 IEEE 19th international conference on mobile ad hoc and smart systems …, 2022 | 3 | 2022 |
Ciphertext-policy attribute-based encryption with multi-keyword search over medical cloud data C Yin, H Wang, L Zhou, L Fang 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 3 | 2020 |
IMTM: Invisible Multi-trigger Multimodal Backdoor Attack Z Li, P Li, X Sheng, C Yin, L Zhou CCF International Conference on Natural Language Processing and Chinese …, 2023 | 2 | 2023 |
GhostEncoder: Stealthy backdoor attacks with dynamic triggers to pre-trained encoders in self-supervised learning Q Wang, C Yin, L Fang, Z Liu, R Wang, C Lin Computers & Security 142, 103855, 2024 | 1 | 2024 |
SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection Q Wang, C Yin, L Fang, L Zhou, Z Liu, R Wang, C Lin arXiv preprint arXiv:2401.00137, 2023 | | 2023 |
DaBA: Data-free Backdoor Attack against Federated Learning via Malicious Server K Chen, L Fang, M Wang, C Yin 2023 International Conference on Image Processing, Computer Vision and …, 2023 | | 2023 |
Vulnerability Analysis of Continuous Prompts for Pre-trained Language Models Z Li, Y Shi, X Sheng, C Yin, L Zhou, P Li International Conference on Artificial Neural Networks, 508-519, 2023 | | 2023 |
SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning X Li, C Yin, L Zhu, X Xu, L Fang, R Wang, C Lin arXiv preprint arXiv:2308.04673, 2023 | | 2023 |
Multi-Layer Feature Division Transferable Adversarial Attack Z Jin, C Yin, P Li, L Zhou, L Fang, X Chang, Z Liu ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023 | | 2023 |
Improve Representation for Cross-Language Clone Detection by Pretrain Using Tree Autoencoder H Ling, A Zhang, C Yin, D Li, M Chang INTELLIGENT AUTOMATION AND SOFT COMPUTING 33 (3), 1561-1577, 2022 | | 2022 |